Weighted Column

v1.0.0

Compare profitability and market share using variable-width column charts. Use for competitive positioning, product portfolio analysis, and pricing strategy.

0· 75·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: guidance for creating weighted/variable-width column charts and strategic analysis. The skill requests no binaries, env vars, or configs that would be unrelated to charting/analysis.
Instruction Scope
The instructions are high-level and describe the expected steps (define axes, gather data, calculate metrics, create chart, analyze). They do not instruct the agent to read system files, environment secrets, or call unexpected endpoints, but 'gather data' is deliberately vague — the agent will need to rely on the user's provided data or its existing connectors.
Install Mechanism
No install spec or code files are provided (instruction-only). Nothing will be written to disk or fetched at install time, minimizing installation risk.
Credentials
The skill declares no environment variables, credentials, or config paths. No disproportionate access to secrets or unrelated services is requested.
Persistence & Privilege
Skill is not always-enabled and is user-invocable. Model invocation is allowed (the platform default) but there is no indication the skill requires permanent or elevated privileges.
Assessment
This skill is coherent and low-risk: it only contains high-level instructions for creating and interpreting weighted-column charts and requests nothing sensitive. Before using, provide the specific dataset you want analyzed (revenue, margins, market share) and avoid pasting any sensitive or proprietary credentials into prompts. Because the instructions are general, confirm what data sources the agent will use (manual upload vs. connected services) so it doesn't attempt to pull unspecified data from other connectors. If you need code or automated chart generation, prefer a skill that includes audited code or an install spec from a trusted source.

Like a lobster shell, security has layers — review code before you run it.

latestvk970yhj9x0a4cmkfcdhheb5tss83d81t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments